From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id AADA3C4332F for ; Sun, 10 Oct 2021 21:48:20 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 91A2D60E95 for ; Sun, 10 Oct 2021 21:48:20 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232788AbhJJVuR (ORCPT ); Sun, 10 Oct 2021 17:50:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:36062 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231343AbhJJVuR (ORCPT ); Sun, 10 Oct 2021 17:50:17 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id D8EC460F35; Sun, 10 Oct 2021 21:48:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1633902498; bh=Os1zFWJs35sbezQJoPQtAyMJ89e8Gqc+3V2HYbnUOd8=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=NRfM6eiDtLst84XKF8OFuyoJi7MII8++8TItsaxfRYEVT5FNTYbpW8NXcHt0FidGb YGtWJZh5ox9iYKWaAMIiE4QPpu5oeZkcCuzTsWHO6N+/6BNk4c2Rd+yuNQoYKnCogV BlXskGaJeY1nmrgdUi5jl4GaMkBYnbIBQe/G9XRY= Date: Sun, 10 Oct 2021 14:48:14 -0700 From: Andrew Morton To: =?ISO-8859-1?Q?Micka=EBl_Sala=FCn?= Cc: Al Viro , Aleksa Sarai , Andy Lutomirski , Arnd Bergmann , Casey Schaufler , Christian Brauner , Christian Heimes , Deven Bowers , Dmitry Vyukov , Eric Biggers , Eric Chiang , Florian Weimer , Geert Uytterhoeven , James Morris , Jan Kara , Jann Horn , Jonathan Corbet , Kees Cook , Lakshmi Ramasubramanian , "Madhavan T . Venkataraman" , Matthew Garrett , Matthew Wilcox , Miklos Szeredi , Mimi Zohar , Paul Moore , Philippe =?ISO-8859-1?Q?Tr=E9buchet?= , Scott Shell , Shuah Khan , Steve Dower , Steve Grubb , Thibaut Sautereau , Vincent Strubel , kernel-hardening@lists.openwall.com, linux-api@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org Subject: Re: [PATCH v14 0/3] Add trusted_for(2) (was O_MAYEXEC) Message-Id: <20211010144814.d9fb99de6b0af65b67dc96cb@linux-foundation.org> In-Reply-To: <20211008104840.1733385-1-mic@digikod.net> References: <20211008104840.1733385-1-mic@digikod.net> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-fsdevel@vger.kernel.org On Fri, 8 Oct 2021 12:48:37 +0200 Micka=EBl Sala=FCn wro= te: > The final goal of this patch series is to enable the kernel to be a > global policy manager by entrusting processes with access control at > their level. To reach this goal, two complementary parts are required: > * user space needs to be able to know if it can trust some file > descriptor content for a specific usage; > * and the kernel needs to make available some part of the policy > configured by the system administrator. Apologies if I missed this... It would be nice to see a description of the proposed syscall interface in these changelogs! Then a few questions I have will be answered... long trusted_for(const int fd, const enum trusted_for_usage usage, const u32 flags) - `usage' must be equal to TRUSTED_FOR_EXECUTION, so why does it exist? Some future modes are planned? Please expand on this. - `flags' is unused (must be zero). So why does it exist? What are the plans here? - what values does the syscall return and what do they mean?